Movatterモバイル変換


[0]ホーム

URL:


US7219134B2 - Network system - Google Patents

Network system
Download PDF

Info

Publication number
US7219134B2
US7219134B2US10/360,356US36035603AUS7219134B2US 7219134 B2US7219134 B2US 7219134B2US 36035603 AUS36035603 AUS 36035603AUS 7219134 B2US7219134 B2US 7219134B2
Authority
US
United States
Prior art keywords
content
server
signature
registration
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/360,356
Other versions
US20040054779A1 (en
Inventor
Yoshiteru Takeshima
Masahiko Nakahara
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hitachi Ltd
Original Assignee
Hitachi Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hitachi LtdfiledCriticalHitachi Ltd
Assigned to HITACHI, LTD.reassignmentHITACHI, LTD.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: TAKESHIMA, YOSHITERU, NAKAHARA, MASAHIKO
Publication of US20040054779A1publicationCriticalpatent/US20040054779A1/en
Application grantedgrantedCritical
Publication of US7219134B2publicationCriticalpatent/US7219134B2/en
Adjusted expirationlegal-statusCritical
Expired - Fee Relatedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A network system having a client, a content server, application servers and a proxy server is described. The proxy server relays content and data between the client, the content server and the application servers upon a request for content from the client. The application servers process the requested content in accordance with pre-established signature and content verification requirements before the content is relayed to the client. The applications servers also provide signature and content verification management for the network.

Description

INCORPORATION BY REFERENCE
This application claims priority based on a Japanese patent application, No. 2002-267551 filed on Sep. 13, 2002, the entire contents of which are incorporated herein by reference.
BACKGROUND OF THE INVENTION
In a network system wherein content existing on a server can be accessed from clients connected to the server through communication lines, the present invention relates to a proxy server that relays data to be communicated between the server and the clients, and a system using the proxy server.
It has been come into popular use for end users to download computer-executable programs and files of music and moving pictures, using a protocol called Hypertext Transfer Protocol (HTTP), and run programs or play music and moving pictures on the end users' personal computers. In this way of getting programs and information files over a network, it is an important problem to assure providing user terminals with security. It is possible that, for example, a malicious third party invades a Web server on the Internet and alters data of content (for example, a moving picture file or computer-executable program) existing on the server to program data polluted with a computer virus. In that event, when a user downloads the program to the user's terminal unconsciously and run the program, trouble will happen that data stored on the terminal is corrupted or that the user personal important information that should be secret is transmitted over a network freely by the malicious third party. As countermeasures against such trouble, a virus detection program is used to detect and eliminate computer viruses. The countermeasures using the virus detection program may be taken in the following two manners.
One method is running the virus detection program on end user's terminals or a Web server. Another method is running the virus detection program on a proxy server or a fire wall, wherein content being downloaded to a user terminal is checked for viruses in real time. A Web proxy is a Web communications intermediary technology via which Web data is transmitted from a server to a client. Description of the Web proxy is provided in Sections 1.3 and 1.4, R. Fielding, et al. RFC 2616 “Hypertext Transfer Protocol—HTTP/1.1” June, 1999, The Internet Society, <URL:http://www/ietf.org/rfc/rfc2626.txt>. The latter method in which virus detection is performed on the network is suitable for communication carriers that provide Internet connection services in providing users with security services as well.
As an advanced version of the latter technology, a Web proxy verifies digital signatures, as described in PCT Gazette WO 00/64122. According to this art, tampered content is detected as follows. First, a digital signatures to all content items stored on a Web server are generated beforehand. When content is downloaded via the Web proxy, the Web proxy verifies that the content being downloaded is authorized, using its digital signature. The digital signatures are generated and stored in a storage of the Web proxy beforehand. If authorized content is verified, the content is sent as is to the user that requested the content. If tampered content is detected, the Web proxy returns an error message or sends its original content stored beforehand on it to the user.
In the former method, it is difficult to install the virus detection program on all user terminals connected to the network. If a mobile phone is used as such a terminal, it is impossible to run the virus detection program on it. Even if virus check is performed on the server, there is a possibility of the checked data being polluted with a virus when it is routed over the network.
In the latter method by which the Web proxy performs virus detection, because the proxy at which traffic on the network rushes must perform the task of virus detection that is a heavy processing load, the processing performance of the proxy itself becomes very low. Another approach has been proposed in which the virus detection program runs on another server connecting to the proxy and data is exchanged between the server and the proxy. Even for this approach, the processing performance of the server on which the virus detection program runs is also a bottleneck.
In the art disclosed in WO 00/64122, because the proxy does not perform the virus scan, its processing load is reduced. However, increase in its processing load for decrypting digital signatures is inevitable.
As described above, the approach that an intermediary device on the network, instead of the server, performs additional processing of content being downloaded from the server to a client involves the problem that its processing load becomes too heavy.
Another problem also exists. The sequence of downloading a plurality of contents cannot be checked by prior art, even though such check would be desirable. For example, when a content and its metadata are downloaded, it cannot be checked whether the content is downloaded after the metadata is downloaded.
SUMMARY OF THE INVENTION
The present invention is characterized in that an intermediary communication device (referred to as a proxy server) provided between a client and a server comprises a unit that relays communication data which relays data to be communicated between the client and the server and a unit that calls out application server which encapsulates content received via the unit that relays communication data from the server into a predetermined format message, forwards the message to an application server, and receives the content and data returned as the result of additional processing performed by the application server. Consequently, the intermediary device on the network, instead of the server, is competent to instruct application servers to perform additional processing of content being downloaded to the client.
The proxy server includes a transfer control database in which conditions by which content is forwarded to one of the application servers and information about the application servers, required for forwarding the content, are set and stored. The unit that relays communication data parses an access request and information described for content to be accessed and the content is forwarded to an appropriate application server if the access request and the content-associated information satisfy the conditions stored in the transfer control database.
The unit that calls out application server parses the result returned from the application server and the content sent back from the server, the data returned from the application server, the content that has been cached on the proxy server previously, or an error message is sent back to the client. Thus, an appropriate response can be sent back to the client and data traffic between the application server and the proxy server can be reduced. Additional processing of content can be performed without reconfiguring the client and server.
The unit that relays communication data may cache content which may be verified content data received from the appropriate application server or content retrieved, according to its URL, via the network. When a particular content item subjected to additional processing provided by an application server should be sent back to a client as a quick response, the application server can instruct the proxy server to cache the content prior to client request for access to the content.
The network system of the present invention includes application servers; for example, a content registration server which registers content accepted from a content creator or provider (referred to as a content manager, also) by the registrant's application into a database, wherein the data of the content is checked by virus detection or the like and a digital signature (hereinafter referred to as, simply, a signature) is attached to the content before registering the content, a content verification server which checks the data of content to be registered by the registrant's application by virus detection or the like, and a signature verification server for verifying signatures.
According the present invention, the server stores signed content and the proxy server forwards the signed content being downloaded by client's request to the signature verification server. The signature verification server verifies the validity of the signature attached to the content and returns the result of verification to the proxy server. If the result of verification is valid, the proxy server sends back the content to the client. If the result is invalid, the proxy server returns an error to the client. The content data is verified beforehand and, when the content is downloaded, it can be ensured that the content data is valid by verifying only the signature attached to the content. Consequently, verified content can more quickly be distributed to clients.
For signature issuance and verification, private key and public key certificates stored on appropriate servers in the network system are used.
Specifically, the proxy server which relays signed content transmitted from the server to a client forwards the signed content to the signature verification server as one of the above-mentioned application servers. Signature verification prevents the content data from being tampered as it is routed over the network without requiring user terminals to run a content verification program. Security is assured while high throughput of the network is maintained.
The content registration server is provided with a function to make the proxy server cache verified content when registering content. This enables quicker sending back of secured content to a client in response to client request for access to a registered content item.
The content verification server includes a table for management of a plurality of security levels so that content verification by a security level that was set, based on a contract or the like can be performed.
Having received signed content, the signature verification server determines whether the content should be sent back to the client and returns the result of the determination to the above-mentioned proxy server. Specifically, the signature verification server performs a tampering check of content, which is achieved by verifying the signature of the content, and searches the database for the content ID specified in the signature and checks whether the content data is valid.
The task of signature verification is separated from the proxy server and assigned to another server, that is, the proxy server at which traffic rushes is made free from the heavy load of the signature verification task. Thus, the processing speed of the proxy server can be enhanced. Maintenance and operation would become easier because reconfiguration can be performed simply by signature verification server replacement and altering the transmission setting on the proxy server and it is not necessary to add a new software function or alter software for signature verification processing or stop the proxy server operation.
The database managed by signature verification servers always synchronize with the database of content registration servers. Thus, management can be performed such that content registration information is shared by the application servers within the network system of the present invention and its inconsistency does not occur.
A method for content verification of the present invention enables verifying whether a couple of content items are downloaded properly to a client by registering a plurality of content items in a couple on the content registration server. Specifically, the signature of a second content item is included in a first content item. When verifying the first content item, the signature verification server stores the signature of the second content item included in the first content item. When verifying the second content item, the signature verification server performs verification, using the stored signature of the second content item. Thus, it can be verified that the first and second content items are downloaded as those registered in a couple. Control is possible such that the couple of content items should be judged valid only when one content item is downloaded after the other content is downloaded.
In the present invention, content means digital data such as text files, multimedia data (for example, music files and moving picture files), or computer-executable programs.
According to the present invention, a high-speed or high-functionality content verification system can be realized without the need to reconfigure the clients and server.
These and other benefits are described throughout the present specification. A further understanding of the nature and advantage of the invention may be realized by reference to the remaining portions of the specification and attached drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram representing how a network system which enables content verification is built logically.
FIG. 2 is a diagram representing a functional configuration of aproxy server20.
FIG. 3 illustrates an example oftransfer control database22 structure.
FIG. 4 is a diagram representing a functional configuration of asignature verification server40.
FIG. 5 illustrates an example ofregistration database45 structure.
FIG. 6 is a diagram representing a functional configuration of acontent registration server50.
FIG. 7 illustrates an example of synchronizingregistration databases45.
FIG. 8 illustrates an example of a security management table provided in acontent verification system60.
FIG. 9 illustrates an example of signedcontent31 structure.
FIG. 10 illustrates a process flow example of a content registration procedure in the network system.
FIG. 11 illustrates another process flow example of a content registration procedure in the network system.
FIG. 12 illustrates a process flow example of a content deregistration procedure in the network system.
FIG. 13 illustrates a process flow example of downloading content in the network system.
FIG. 14 is a diagram representing a configuration of an information processing device; all devices employed in the present invention can be embodied in this configuration.
FIG. 15 shows an example of forming the network system according to another preferred embodiment of the invention.
FIG. 16 illustrates a process flow in a content verification method according to a further preferred embodiment of the invention.
DESCRIPTION OF THE PREFERRED EMBODIMENTS
All devices involved in illustrative embodiments of the present invention can be constituted as a general computer system, for example, as is shown inFIG. 14. A device is comprised of aCPU11, amemory12, areader13 which reads data from a removable andportable storage medium18 such as a CD-ROM, DVD-ROM, etc., anetwork interface14 for communicating with a corresponding node via anetwork9,external storage15 such as a HDD, and an I/O unit16 comprising a keyboard, mouse, and display. On each device, a computer program created to implement specific tasks is loaded into thememory12 beforehand and theCPU11 executes the computer program.
The computer program may be stored into theexternal storage15 beforehand or imported from another device via a removable storage medium or a communication medium.
Using the accompanying drawings, a first preferred embodiment of the present invention will be described below.
FIG. 1 is a simplified diagram representing how a network system is built in accordance with the first preferred embodiment of the invention.
In the first preferred embodiment, the network system is comprised of aclient10, aserver30, aproxy server20 which relays data to be communicated between theclient10 and theserver30, asignature verification server40 which verifies whether content should be sent to theclient10, using the signature attached to the content, acontent registration server50 which accepts content beforehand from the content manager such as the content creator or possessor, and generates a signature attached to the content, acontent verification server60 which checks the data of content received by thecontent registration server50, ancertificate authority70 which distributes a certificate revocation list containing revoked ones of public key certificates to be used when thesignature verification server40 verifies the signature, and acontent registrant terminal80 through which the content manager registers content with thecontent registration server50. All the above-mentioned devices are interconnected via anetwork9.
Theclient10 and theserver30 are connected via at least oneproxy servers20. Theproxy server20 connects to thesignature verification server40 and thesignature verification server40 connects to thecontent registration server50 and thecertificate authority70. Thecontent registration server50 connects to thecontent verification server60 and thecontent registrant terminal80.
On theclient10 device, a existing Web client application such as a Web browser runs. When theclient10 user wants to download content such as text data, moving picture data, or program files, stored on theserver30, theclient10 sends the server30 a message (access request) that requests theserver30 to send the content and receives the content.
When theserver30 on which a Web server program runs receives the access request from theclient10, it sends the requested content to theclient10. In the present preferred embodiment, theserver30 stores signedcontent31 which is illustrated inFIG. 9 in its storage.
Signedcontent31 is prepared prior to access request from theclient10 as follows. Content supplied from thecontent registrant terminal80 is registered on thecontent registration server50; at this time, the content data is checked by thecontent verification server60 and a signature is attached to the content so that the content is allowed to be downloaded to theclient10. Signatures in the present preferred embodiment are generated by public key encryption using a hash function.
The signedcontent31 illustrated inFIG. 9 comprisesoriginal content311 which may be text, a moving picture, a computer-executable program, or the like and asignature312 part which is used for verifying the validity of theoriginal content311. Thesignature312 part comprisessignature information3121, asignature value3122 obtained from encrypting thesignature information3121 with a private key, and apublic key certificate3123 including a public key required for decrypting thesignature value3122. Thesignature information3121 comprises asignature method3124 which indicates a hash function algorithm or the like, acontent ID3125 which is an ID uniquely assigned to the content by the present system, and a characteristic value (digest value) of thecontent3126 calculated by making the hash function act on the content data.
Theproxy server20 inFIG. 1 is provided with a function of relaying an access request sent from theclient10 to theserver30 and content in response to the request (relay function).Destination server30 information (such as a host name and IP address) is included in URL information on content described in the access request message.
Theproxy server20 is also provided with a cache function for caching content it relayed as a response.
Moreover, theproxy server20 forwards signedcontent31 as a response received from theserver30 to thesignature verification server40 with a request to verify itssignature312 if the content satisfies preset conditions (URL, extension, file type, etc. of the content). If the result of the verification returned has no problem, the proxy server sends the content to theclient10.
Communication between theproxy server20 and thesignature verification server40 may be preferably performed, using a communication protocol such as, for example, HTTP or Internet Content Adaptation Protocol (iCAP).
When thesignature verification server40 receives the signedcontent31 transmitted from theproxy server20, it verifies thesignature312, ascertains that the content is not tampered, and returns the verification result to theproxy server20.
Thesignature verification server40 receives and stores beforehand a certificate revocation list containing revoked ones of public key certificates to be used when it verifies thesignature312, distributed from thecertificate authority70. When it receives signedcontent31, it verifies the validity of the public key associated with the content by checking the public key certificate against the certificate revocation list.
Also, thesignature verification server40 stores information that proves the validity of content percontent ID3125 in aregistration database45.
Thecontent registration server50 performs signature issuance and content registration management.
Its signature issuance function is implemented as follows. Thecontent registration server50 accepts a content registration request from thecontent registrant terminal80, receives the content, and sends the accepted content to thecontent verification server60. When it receives the result of verification, it ascertains that the content data has no problem, generates asignature312 to the content, attaches thesignature312 to the content, and returns the result to thecontent registrant terminal80.
For example, when thecontent registration server50 accepts a request for registering a computer-executable program file, it requests thecontent verification server60 to check whether the program data includes computer viruses, whether a class library incorporated within the program to be referenced by the program may cause corruption of data stored on theclient10 terminal or unexpected transmission of the data to a third party, and other possibilities of danger. If the result of the verification is no problem, thecontent registration server50 adds asignature312 to the computer-executable program file.
The content registration management function is to generate a content ID that uniquely identifies accepted content throughout the system and manage content items, according to the validity of content per ID, using the database. This function comprises a function to add registration information for a new content item to the registration database when the content registrant registers content, a function to change the status information about a content item to “invalid” when the validity of the registered content item has lost, and a function to delete the information about an expired content item from the registration database. When a plurality ofsignature verification servers40 andcontent registration servers50 are provided for load sharing, one of thecontent registration servers50 is further provided with a function to distribute registration information about a content item to other servers when the content registrant makes an application for registration of the content item with it and the registration is accepted.
This function prevents inconsistency of registered content items between or among the plurality ofcontent registration servers50 and can avoid an overhead which would otherwise occur whenever eachsignature verification server40 queries the mastercontent registration server50 about registration information for a content item when verifying thesignature312 of the content item.
For example, assume that the content registrant registers content and, thereafter, makes an application for deregistering the content. The mastercontent registration server50 first accepts a request for registering content from thecontent registrant terminal80 and one of thecontent verification server60 checks the content data. Then, the mastercontent registration server50 assigns an ID to the content, registers the content as a new “valid” content item in the registration database, and sends the registration information about the new content item to thesignature verification servers40 and othercontent registration servers50 so that the registration databases on the servers are updated.
When the mastercontent registration server50 receives an application for deregistering the above content from thecontent registrant terminal80, it changes the status information for the content item to “invalid” if it is within the expiry date of the content or deletes the information about the content item from the registration database if the content is expired. Then, the mastercontent registration server50 instructs thesignature verification servers40 and othercontent registration servers50 to make the same change or deletion so that the registration databases on the servers are updated.
If theclient10 requests access to a content item that has been deregistered, the request is handled as follows. After thesignature verification server40 verifies the validity of thesignature312 of the signedcontent31 received from theproxy server20, it checks the content ID within thesignature312. Using the content ID as a key, thesignature verification server40 searches itscontent registration database45A and finds that the status of the content item is “invalid” or the content item has been deleted. Thesignature verification server40 notifies theproxy server20 that the content should not be sent to theclient10 as the verification result of the content item is invalid.
Thecontent verification server60 checks the content data received from thecontent registration server50, checks whether the content should be sent to theclient10, and returns the result of verification to thecontent registration server50. For example, thecontent verification server60 analyzes the content for possibilities of danger; for example, to see whether the data includes viruses, or to see whether a class library incorporated within the program to be referenced by the program may cause corruption of data stored on theclient10 terminal or unexpected transmission of the data to a third party.
Thecertificate authority70 distributes a certificate revocation list (CRL) to thesignature verification server40 periodically or at request of thesignature verification server40.
Thecontent registrant terminal80 is used for the content manager such as the content creator, possessor, or provider to register content with thecontent registration server50 and is provided with a user interface function allowing the content manager to make an application for registering content and registrant information or deleting a content item and a communication function with thecontent registration server50.
Thecontent registrant terminal80 may be a terminal on which a Web browser runs. The registrant as the user of the terminal starts the Web browser, accesses thecontent registration server50, and enters necessary information such as registrant information and a file path (location on a disk) of the content to be registered, which has been stored on thecontent registrant terminal80, into an entry form presented in the Web browser window as a response, and click a “register” button. Then,content registrant terminal80 transmits an application for registering the content and electronic data of the content to thecontent registration server50. Thereafter, as a response from thecontent registration server50, the result of registration of the content is displayed on the screen and the signed content is downloaded.
When the registrant has made an application for deregistering a content item, the result of deregistration of the content is displayed on the screen. If the registration or deregistration is unsuccessful, an error message is returned. The singedcontent31 as the response once received by the registrant is supplied to theserver30 and stored into the storage such as a hard disk on theserver30. For the method of supply, the signedcontent31 can be transferred from thecontent registrant terminal80 to theserver30 over a secure transmission path set up therebetween; alternatively, it is possible to store the signedcontent31 on a storage medium such as a flexible disk and transport the disk to theserver30.
In the configuration shown inFIG. 1, the functions realized by a plurality of devices may be physically realized by a single device. For example, the functions of thesignature verification server40 may be incorporated into theproxy server20. The functions realized by a single device may be physically realized by a plurality of devices. For example, the signature issuance and content registration management functions of thecontent registration server50 may be realized by separate servers which communicate with each other via the network.
UsingFIGS. 2 to 14, the first preferred embodiment of the invention will be further described.
FIG. 2 is a diagram representing a configuration of theproxy server20 in the present preferred embodiment.
Theproxy server20 in the present preferred embodiment is comprised of a unit that relayscommunication data21 which relays data to be communicated, atransfer control database22 in which conditions and information for forwarding communication data to thesignature verification server40 are stored, and a unit that calls outapplication server23 for making connection to thesignature verification server40.
The unit that relayscommunication data21 receives an access request transmitted from theclient10 and forwards it to theserver30 designated by the URL specified in the access request message. Also, this unit receives non-signed content sent back from theserver30 and forwards it to theclient10.
When the unit that relayscommunication data21 receives signedcontent31, it passes the signedcontent31 which is unverified to the unit that calls outapplication server23 in order to forward it to thesignature verification server40, based on the conditions and information stored in thetransfer control database22. Thereafter, when the unit that relays communication data receives a “verification successful” message as the result of verification ororiginal content311 as a response from thesignature verification server40, it sends back theoriginal content311 to theclient10. When the unit receives the signedcontent31 as the response, it removes thesignature312 from the content and sends back theoriginal content311 or the signedcontent31 as is to theclient10. Whether or not thesignature312 should be removed is determined by setting of theproxy server20. If the unit receives a “verification unsuccessful” response message, it sends an error notification to theclient10. If the unit receives content other than theoriginal content311 as the response, it may send the received content as is to theclient10.
Thetransfer control database22 is a table-form database wherein atransfer condition field221 entry is used as a search key, as is illustrated inFIG. 3. This database is used for managing the conditions for forwarding signedcontent31 to thesignature verification server40. Theentries225 of thetransfer control database22 are as follows. In thetransfer condition field221, a condition that triggers transmission of signedcontent31 to thesignature verification server40 is stored. In thedestination URL field222, a destination URL of thesignature verification server40 to which theproxy server20 transmits the signed content matched with the entry in thetransfer condition field221 is stored. In theservice designation field223, a service to be executed for the signed content matched with the entry in thetransfer condition field221 is stored. In thetiming field224, information as to when theproxy server20 transmits the signedcontent31 matched with the entry in thetransfer condition field221 to thesignature verification server40 is stored.
For example, on a row of theentries225 marked out inFIG. 3, extension=“.exe” exists in thetransfer condition field221 and, therefore, a content file with URL including extension “.exe” specified in the access request message received from thecline10 matches this condition. For the matched content data to be communicated, a “virus scan” service must be executed. To do this, the signedcontent31 is forwarded to thesignature verification server40 designated by URL “http://webservicel/virus_scan.cgi” “upon reception of content” from theserver30.
In some embodiment, the URL of a destinationsignature verification server40 may be specified in thesignature312 attached to content and the signedcontent31 received be forwarded to thesignature verification server40 designated by the URL described within thesignature312.
When theproxy server20 is going to transmit signedcontent31 to thesignature verification server40, the unit that calls outapplication server23 inFIG. 2 establishes connection to thesignature verification server40 and creates a message32 including the signedcontent31. This message is constructed, for example, by appending URL321 as the destination to access, which is specified in the access request message from theclient10 and stored on theproxy server20, to the signedcontent31 illustrated inFIG. 9. The use of theURL312 as the destination to access makes it possible to check whether the signedcontent31 is downloaded from the correct URL where it must be located when thesignature verification server40 verifies thesignature312.
FIG. 4 shows a configuration example of thesignature verification server40.
A unit that acquiressignatures41 parses the message32 transmitted from theproxy server20 and gets the signedcontent31 which is unverified. Then, it takes out thesignature312 attached to thecontent31, takes out thepublic key certificate3123 which is required for verifying the validity of thesignature312 from thesignature312 of thecontent31, and passes the public key certificate to a unit that verifiescertificates42.
As the result of verification, if thepublic key certificate3123 is valid, the unit that verifiescertificates42 gives the public key to the unit that acquiressignatures41. The unit that acquiressignatures41 passes thesignature312 and pubic key to a unit that verifiessignatures44 from which it gets the result of verification of thesignature312. As the result of this verification, if it is ascertained that thecontent31 is “valid,” the unit that acquiressignatures41 returns a “verification successful” message to theproxy server20. Together with this message, the unit may send theoriginal content311 or signedcontent31 for which verification was successful to theproxy server20.
If the unit that acquiressignatures41 receives a verification unsuccessful response from the unit that verifiescertificates42 because the public key certificate is invalid or if it is notified that thecontent31 is “invalid” or “void” as the result of verification from the unit that verifiessignatures44, it notifies theproxy server20 of verification unsuccessful. A function may be added to send a message that prompts the registrant of the content to deregister the content from theserver30 when the content has proved invalid.
The unit that verifiescertificates42 receives a certificate revocation list (CRL) from thecertificate authority70 periodically or when required and stores this list into the certificaterevocation list database43 for management. Having received thepublic key certificate3123 from the unit that acquiressignatures41, the unit that verifiescertificates42 first checks whether the public key certificate is expired and annulled. Then, referring to the certificaterevocation list database43, the unit that verifiescertificates42 checks whether thepublic key certificate3123 is revoked. When thepublic key certificate3123 has proved valid, the unit that verifiescertificates42 passes the public key existing within thepublic key certificate3123 to the unit that acquiressignatures41 as the result of processing. If the public key certificate is invalid, the unit that acquiressignatures41 is notified of verification unsuccessful.
Having received thesignature312 and the public key from the unit that acquiressignatures41, the unit that verifiessignatures44 verifies thesignature312. It passes thecontent ID3125 from the signature32 to a unit that managesregistration information46A where the registration database is searched for the status of registration of the content. As the result of search, if the status of the content registration is valid, the unit that acquiressignatures41 is notified of result “valid.” If the status is invalid or void, the unit that acquiressignatures41 is notified of result “invalid.”
Theregistration database45A is a table-form database wherein acontent ID3125 entry is used as a search key and this database is used for content registration status management. The content registration status indicates that the status of a content item is “valid” (that is, the content should be sent to theclient10 as a response) or “void” (that is, the content should not be sent to theclient10 as a response). The status of a content item is set “valid” when the content has been registered on thecontent registration server50 and it is within its expiry date. The status of a content item is set “void” when the registrant's application for deregistering the content has been issued to thecontent registration server50 and the content deregistered, though the content has previously been registered on thecontent registration server50 and it is within its expiry date. When a content item is expired or an application for registering the content is not issued to the content registration server50 (not registered in theregistration database45A), it is made “invalid.”
Difference between “void” and “invalid” may be reflected in logs output from thesignature verification server40 and theproxy server20 and a response message sent back to theclient10 or a messages mailed to the registrant of the content.
An example ofregistration database45A structure is illustrated inFIG. 5.
In thecontent ID field451, acontent ID3125 uniquely assigned to a registered content item within the system is stored. In thestatus field452, the status of registration of the content which has been described above is stored. In theexpiry date field453, the expiry date of the registered content is stored. A content item whose expiry date passed is made invalid and the registrant of the content has to perform its re-registration (renewal) to make it return to service.
In theURL field454, an URL where the registered content is located on the network is stored. In theregistrant information field455, the person information as to the registrant of the content, such as, address, name, and e-mail address, is stored. In the field of when it was invalided456, the date when the content was deregistered by the registrant's application for deregistering the content issued to thecontent registration server50 is stored. In thesecurity level field457, a security level associated with the content is stored, which is used for processing by thecontent verification server60 and will be described later.
The unit that managesregistration information46A inFIG. 4 searches theregistration database45A and updates the database. Having received a search request for acontent ID3125 from the unit that verifiessignatures44, the unit that managesregistration information46A searches theregistration database45A for thecontent ID3125, judges the registration status of acontent ID3125 from the information stored in thestatus field452 of the content, and notifies the unit that verifiessignatures44 of result “valid,” “void”, or “invalid.” Having received an update request (for registration or deletion) from thecontent registration server50, the unit that managesregistration information46A updates the contents of theregistration database45A, according the request. In possible embodiment, theregistration database45A is not stored within thesignature verification server40; instead, another server manages an integrated database of registration, wherein thesignature verification server40 sends acontent ID3125 and a search request for registration information to that server over the network.
FIG. 6 shows a configuration example of thecontent registration server50.
When the content registering/deregisteringunit51 receives an access request from thecontent registrant terminal80, it sends back an entry form window interface which is used for the registrant to enter necessary information, and accepts an application for registering or deregistering (deleting) content. Then, the content registering/deregisteringunit51 receives necessary information such as registrant information andoriginal content311 from thecontent registrant terminal80. When having accepted the application for registering the content, the content registering/deregisteringunit51 sends theoriginal content311 to be registered with a request for verifying the content data to thecontent verification server60. If the result of verification has no problem, the content registering/deregisteringunit51 requests the unit that managesregistration information46B to register the content and getscontent ID3125. Then, the content registering/deregisteringunit51 passes theoriginal content311 and the obtainedcontent ID3125 to a unit that generatessignatures52. After getting signedcontent31 from the unit that generatessignatures52, the content registering/deregisteringunit51 sends back the result of action and the signedcontent31 to thecontent registrant terminal80. When having accepted the registrants application for deregistering content, the content registering/deregisteringunit51 prompts the registrant to enter thecontent ID3125 or URL from thecontent registrant terminal80. Using the registrant-specifiedcontent ID3125 or URL as the search key, the content entry is searched out from the database and deleted.
Having receivedcontent ID3125, the unit that generatessignatures52 creates signedcontent31 illustrated inFIG. 9. At this time, the unit that generatessignatures52 gets the relevant private key and public key certificates required for generating asignature312 to the content from a unit that manageskeys53 where such key certificates are stored securely.
The unit that managesregistration information46B is essentially the same as the unit that managesregistration information46A shown inFIG. 4. When the unit that managesregistration information46B receives a request for registering content, its additional function is to create a new entry in theregistration database45B and assign acontent ID3125 that is not in use to the content. When the unit that managesregistration information46B receives acontent ID3125 or URL and a request for deleting content, it searches theregistration database45B for a content entry matching with the search key that is the receivedcontent ID3125 or URL and deletes the matched content entry.
Moreover, the unit that managesregistration information46B has the following function. When a content item is registered or deregistered, this unit instructs othercontent registration servers50 andsignature verification servers40 to register or delete the same content into/from theirregistration databases45, using communication over the network. This function makes it possible to assure consistency of the contents of all the databases. Theregistration database45B is the same as theregistration database45A illustrated inFIG. 5.
FIG. 7 illustrates an example of a method of synchronizing theregistration databases45 respectively used by remote units that manage registration information46 over the network. In a case where a plurality ofcontent registration servers50 are provided, synchronizing a plurality ofregistration databases45 is important. In order to avoid inconsistent contents of the databases andcontent ID3125 duplication,registration databases45 are prepared so that latest information is always stored therein and onecontent registration server50A is positioned as the master. When anothercontent registration server50B (slave) receives an application for registering content, its content registering/deregisteringunit51 passes the request for registering content to the unit that managesregistration information46B. Through communication over the network, the request for registering content is then transferred to the contentregistration server master50A and acontent ID3125 is assigned to the content. Using thiscontent ID3125, theregistration databases45B are updated and asignature312 is generated. Thus, thecontent ID3125 can be shared between thecontent registration servers50 and its duplication can be avoided.
FIG. 8 illustrates an example of a table-form database provided in thecontent verification server60, which is used for verifying the contents of a computer-executable program file.
This database is used to determine a security level, according to functions to be used in a computer-executable program file and class libraries incorporated in the program. Perentry row620, the table has asecurity level field611 to contain a value indicating a program security level, function designation fields612 through614, and class library designation fields615 through617. The table example ofFIG. 8 gives information that aprogram using function1 and a program in whichclass library1 is incorporated havesecurity level2.
The security level that thecontent verification server60 determined by referring to the above database when verifying content is compared with the security level specified by the registrant of the content and contained in thesecurity level field457 in theregistration database45 illustrated inFIG. 5. By this comparison, content distribution can be restricted by a security level, according to the contract made between the operator of the present system and the content registrant. For example, the following arrangements can be made: content registrant A who pays a rather high contract rate to the operator of the system is allowed to distribute programs of a lower security level, whereas content registrant B who pays a rather low contract rate to the operator can distribute only programs of high security level.
FIG. 10 illustrates a process flow example of a content registration procedure starting with the registrant's application for registering content, primarily carried out by the content registration server,master50A.
First, the registrant of content enters necessary information includingregistrant information455, using a Web browser, at the content registrant terminal80 (S501). The necessary information andoriginal content311 are sent to the content registration server,master50A (S502). The content registering/deregisteringunit51 receives necessary information including theregistrant information455 and the content311 from thecontent registrant terminal80 and sends thecontent311 to the content verification server60 (S503, S504). Thecontent verification server60 verifies the content (S505) and returns the result of verification (S506).
The content registration server,master50A checks the content verification result returned (S507). If there is no problem (for example, the program does not include viruses, or the program does not use functions of low security), the unit that managesregistration information46B assigns ancontent ID3125 that is not in use to the content (S510). Then, the unit that generatessignatures52 generates a signature312 (S511). Then, anew content entry459 is added to theregistration database45B (S512). Furthermore, the unit that managesregistration information46B instructs thesignature verification server40 and anothercontent registration server50 to update the registration databases (register the content into the databases) (S513 through S515). Finally, the content registering/deregisteringunit51 sends a notification of result “registration procedure complete” together with the signedcontent31 to the content registrant terminal80 (S516, S517).
If a problem is detected in the verification result in step S507, the content registering/deregisteringunit51 sends a notification of result “unsuccessful content verification” to the content registrant terminal80 (S508, S509).
FIG. 11 illustrates a process flow example of a content registration procedure starting with the registrant's application for registering content, primarily carried out by a slavecontent registration server50B.
The S501 through S509 are the same as the corresponding ones ofFIG. 10. Following S507, registering the content with the content registration server,master50A is performed (S601). The content registration server,slave50B sends theregistrant information455 and thecontent31 to the content registration server,master50A (S602). Themaster server50A assigns acontent ID3125 to the content (S603), updates theregistration database45B (S604), and transfers thecontent ID3125 to the content registration server,slave50B (S605). S605 and subsequent steps are the same as S511 through S517 ofFIG. 10.
FIG. 12 illustrates a process flow example of a content deregistration procedure starting with the registrant's application for deregistering content, carried out by thecontent registration server50.
First, the content registering/deregisteringunit51 receives the URL orcontent ID3125 of a content item to be deregistered (deleted) by the registrant's application from thecontent registrant terminal80 and the unit that managesregistration information46B searches theregistration database45B for the content (S201). It is checked whether there is the content to be deleted (S202). If it is found, its expiry date field is checked and whether it is within the expiry date is checked (S203). If it is within the expiry date, thestatus452 is changed to “void” (S204). If it is beyond the expiry date, the entry row itself is deleted (S205). Then, the unit that managesregistration information46B directs thesignature verification servers40 and othercontent registration servers50 to update their registration databases (delete the content from the databases) (S206). Finally, the content registering/deregisteringunit51 sends a notification of result “deregistration procedure complete” to the content registrant terminal80 (S207). If the content to be deleted is not found instep S202, the content registering/deregisteringunit51 notifies thecontent registrant terminal80 of an error message (S208).
Then, a process flow example of expiry date check in theregistration database45, which should be performed periodically on the mastercontent registration server50, will be explained.
First, the unit that manages registration information46 refers to theentries459 in theregistration database45 and checks whether there is an unreferenced entry. If it is found, whether it is beyond the expiry date is checked by referring to theexpiry date field453. If it is beyond the expiry date, the entry row is deleted. If it is within the expiry date, the entry row is not deleted. The above action is repeated forother entries459, if exist. If unreferenced entries no longer exist, the unit that managesregistration information46B directs thesignature verification servers40 and othercontent registration servers50 to update their registration databases by making the same deletion.
FIG. 13 illustrates a process flow example of handling a request for access to signedcontent31 issued from theclient10.
First, theclient10 sends an access request to the proxy server20 (S701, S702). Theproxy server20 checks whether the content to be accessed has been cached on it (S703). If it has been cached, the proxy server sends the cached content to the client (S704, S705). If not, the proxy server forwards the access request to the server30 (S706).
After theserver30 sends back signedcontent31 to the proxy server20 (S707, S708), theproxy server20 forwards thecontent31 to the signature verification server40 (S709, S710). Thesignature verification server40 verifies the signature as additional processing and returns the result (S711, S712). At this time, together with the result, the verifiedoriginal content311, signedcontent31, or an error message may be sent to theproxy server20.
Then, theproxy server20 sends the verifiedoriginal content311, signedcontent31, or the error message to the client10 (S713, S714) and caches the original content or signedcontent31 if cache space is available for the content (S715).
If signedcontent31 is sent to the proxy server in steps S711, S712, theproxy server20 may remove thesignature312 from the signedcontent31 in step S713 and send theoriginal content311 to theclient10. If the URL of another content is specified in theoriginal content311 verified by thesignature verification server40, the proxy server may request the server to access the URL and retrieve the content and send the content received from the server to theclient10.
In possible embodiment, when registering content by the registrant's application, thecontent registration server50 may instruct the unit that relayscommunication data21 of theproxy server20 to cache the verified content. The advantage hereof is quick response to access request because the content registered by thecontent registration server50 is immediately cached on theproxy server20. When access to the content is requested from theclient10, the cached content is always sent back to the client unless the content is uncached.
In a second preferred embodiment of the invention, which is shown inFIG. 15, a plurality ofproxy servers20 are provided and anencrypted communication channel901 is established between twoproxy servers20A and20B.Clients10 can connect to a proxy server at near location.
In the second preferred embodiment, oneproxy server20A with the caching advantage that enables quick response to aclient10, another proxy server B that is nearer to theserver30, and thesignature verification server40 are operated separately; consequently, the distributed functions enable load sharing in the system. It is also possible that different operators run respective proxy servers which have different functions; for example, a communication carrier provides and maintains theproxy server20A and a corporation or a content provider provides and maintains theproxy server20B.
Next, a third preferred embodiment of the invention will be described which is illustrated by another example of process flow of downloading content, using the invented network system and content verification method. Downloading content through the network to a PC or cellular mobile phone is performed in the following sequence.
Before downloading content itself, download a file called metadata in which supplementary information such as the URL where the content is located is described. Then, parse the information described in the metadata, download the content itself, based on the thus obtained information, and execute the content.
In the third preferred embodiment, thesignature312 of the content is appended to the metadata. The metadata includes itssignature312 and thesignature312 of the content that is coupled with the metadata. Thesignature verification server40 stores thesignature312 of the content when the metadata is downloaded and verifies the content which is downloaded later, using the storedsignature312.
Linking metadata with the URL of a content item is performed when thecontent registration server50 registers the content item. Thesignature verification server40 receives this linking information from thecontent registration server50 and manages the linking information in a table. Using this linking table, thesignature verification server40 also manages locations where themetadata signature312 attached to the metadata and thecontent signature312 are stored. When having received metadata or content having a URL not registered in this table, thesignature verification server40 handles it as an illegal access error. Furthermore, it is preferable to set expiry dates for thesignatures312 of content items to be stored on thesignature verification server40 beforehand; this can prevent unnecessary consumption of the memory resources of the server.
UsingFIG. 16, the third embodiment will be explained fully. When theclient10 sends a request for access to metadata to the proxy server50 (S801), theproxy server50 checks whether the metadata object to be accessed has been cached on it. If it has been cached, the proxy server sends the cached metadata to the client10 (S802). If not, the proxy server forwards the access request to the server30 (S803).
After theserver30 sends back signed metadata to the proxy server20 (S804), theproxy server20 forwards the metadata to the signature verification server40 (S805). Thesignature verification server40 verifies themetadata signature312, stores both themetadata signature312 andcontent signature312 included in the metadata, registers their locations into the linking table (S806), and returns the result (S807). Then, theproxy server20 sends the verified metadata or an error message to the client (S808) and caches the metadata if cache space is available for the metadata (S810).
Theclient10 parses the received metadata (S809) and sends a request for access to the content designated in the metadata to the proxy server20 (S811). Theproxy server20 checks the content (whosesignature312 has been verified) to be accessed has been cached on it. If it has been cached, the proxy server sends the cached content to the client10 (S812). If not, the proxy server forwards the access request to the server30 (S813). After theserver30 sends back the content to the proxy server20 (S814), the proxy server forwards a message32 comprising the content and the URL as the destination to access321 to the signature verification server40 (S815).
Thesignature verification server40 searches the linking table for an object matching with the URL of the content as the search key and searches for thesignature312 of the content stored when the metadata was downloaded before and managed under the entry of the metadata coupled with the content. If the storedsignature312 of the content is found, then, thesignature verification server40 verifies the content (S816) and returns the result. If not, thesignature verification server40 returns an error (S817). Then, theproxy server20 sends the verified content or an error message to the client10 (S818) and caches the content if cache space is available for the content (S819).
If a plurality ofsignature verification servers40 are provided in this embodiment, content must be verified by asignature verification server40 that verified the metadata coupled with it. For this reason, theproxy server20 manipulates data so that content is surely forwarded to the specifiedsignature verification server40. Specifically, the content's URL described in the metadata sent back to theproxy server20 in step S807 or the status information of the HTTP session stored in the HTTP header used when transmitting content and metadata (for example, a cookie header) is rewritten or additionally written and theID3125 that identifies thesignature verification server40 that is to verify the content is added.
For example, content's URL “http://server A/metadata” should be written to “http://server A/metadata?signature verification server=01.” Because the client sends a request for access to content with the rewritten URL in step S811, theproxy server20 parses the additional portion of the URL “signature verification server=01” following the question mark “?” and forwards the content to the specifiedsignature verification server40 during the process of downloading the content.
For cookie, for example, header “Set-Cookie2: signature verification server=01” should be appended to the HTTP message to be exchanged between theproxy server20 and thesignature verification server40. When theproxy server20 receives a request with the cookie header “Cookie: signature verification server=01” from theclient10, it parses the cookie header and can forward the content to the specifiedsignature verification server40 as is the case for the URL example. Because theproxy server20 has the information stored as to thesignature verification server40 to which the metadata was forwarded, theproxy server20 may describe the cookie header and append it to the metadata which is sent back to theclient10.
The third preferred embodiment have the following two advantages:
First, it can be verified whether content is downloaded in conjunction with its proper metadata. Content's URL is described in the metadata and theclient10 requests access to the content after parsing the metadata. However, verifying metadata and content separately cannot detect false metadata written by a third party for accessing to content. For protection, thecontent signature312 is attached to the metadata so that it can be verified that proper content and metadata coupled together are downloaded.
Second, content to be provided is not manipulated and, therefore, downloaded content, even if it is downloaded without utilizing the invented network system, can be executed on theclient10 without trouble. For example, from mobile phones, access to content and metadata must be performed through the invented network system. From PCs, however, such access is possible without the intervention of the invented network system. In the latter case, when downloading signed metadata and content, the device to which the metadata with irrelevant data (signatures312) was downloaded normally ignores the irrelevant data without judging it as an error because the metadata is supplementary data and it is not executed. However, if the device attempts to execute signed content, there is a possible of an error due to the data irrelevant to the content (that is, the signature312) attached to the content. By including content's signature in metadata as in this embodiment, this kind of errors on theclient10 can be avoided.
The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that various modifications and changes may be made thereto without departing from the spirit and scope of the invention as set forth in claims.

Claims (2)

1. A network system comprising:
a client which sends an access request to a server;
the server which receives the access request from the client and distributes content;
application servers, each of which performs, upon reception of content, additional processing of the content and returns processed content and data to a unit that sent the content to it;
a proxy server which relays data to be communicated between the client and the server, said proxy server comprising:
a unit that relays communication data which receives the access request from the client and forwards it to the server and receives the content from the server,
a unit that calls out application server which receives content from the unit that relays communication data, encapsulates the content into a predetermined format message, forwards the message to one of the application servers, and receives the content and result of additional processing performed by the application server,
wherein the unit that relays communication data sends data based on the result to the client,
wherein the unit that relays communication data caches the content sent back from the server, and, when having received a request for access to the cached content from the client, sends back the cached content to the client if it is within its expiry date which has been indicated by the metadata of the content or set on the proxy server beforehand, and
wherein the unit that relays communication data caches the processed content received from one of the application servers or content retrieved via the network, according to information indicating a processed content location on the network;
a content registration server which accepts content from a content manager;
a content registrant terminal on which a program runs to provide an interface for registering content with the content registration server;
a content verification server which receives content from the content registration server and checks the content data by a predetermined method;
wherein the content registration server creates signed content by attaching a signature to content received from the content registrant terminal if the content verification server has verified that the content satisfies predetermined conditions;
wherein one of the application servers is a signature verification server which verifies the signature of the signed content, said signature verification server comprising:
a unit that acquires signatures which takes out a signature from signed content that is unverified received from the proxy server,
a unit that verifies certificates which verifies the validity of a public key certificate to be used for verifying the signature;
a certificate revocation list database for management of a certificate revocation list to be used for verifying the validity of a public key certificate,
a unit that verifies signatures for verifying signatures;
a registration database for storing registration information per content ID included in a signature, and
a unit that manages registration information for managing the registration information per content ID;
the server stores the signed content created by the content registration server;
the proxy server forwards the signed content received from the server to the signature verification server and determines whether the signed content should be sent to the client, according to the result of verification returned; and
wherein the signature verification server communicates with the content registration server so that the registration database is synchronized with the same database on the content registration server.
2. A network system comprising:
a client which sends an access request to a server;
the server which receives the access request from the client and distributes content;
application servers, each of which performs, upon reception of content, additional processing of the content and returns processed content and data to a unit that sent the content to it;
a proxy server which relays data to be communicated between the client and the server, said proxy server comprising:
a unit that relays communication data which receives the access request from the client and forwards it to the server and receives the content from the server,
a unit that calls out application server which receives content from the unit that relays communication data, encapsulates the content into a predetermined format message, forwards the message to one of the application servers, and receives the content and result of additional processing performed by the application server,
wherein the unit that relays communication data sends data based on the result to the client,
wherein the unit that relays communication data caches the content sent back from the server, and, when having received a request for access to the cached content from the client, sends back the cached content to the client if it is within its expiry date which has been indicated by the metadata of the content or set on the proxy server beforehand, and
wherein the unit that relays communication data caches the processed content received from one of the application servers or content retrieved via the network, according to information indicating a processed content location on the network;
a content registration server which accepts content from a content manager;
a content registrant terminal on which a program runs to provide an interface for registering content with the content registration server;
a content verification server which receives content from the content registration server and checks the content data by a predetermined method;
wherein the content registration server creates signed content by attaching a signature to content received from the content registrant terminal if the content verification server has verified that the content satisfies predetermined conditions;
wherein one of the application servers is a signature verification server which verifies the signature of the signed content;
the server stores the signed content created by the content registration server;
the proxy server forwards the signed content received from the server to the signature verification server and determines whether the signed content should be sent to the client, according to the result of verification returned;
wherein
a signature to a second content item is included in a first content item;
when verifying the first content item, the signature verification server stores the signature of the second content item included in the first content item; and
when verifying the second content item, the signature verification server performs verification, using the stored signature of the second content item.
US10/360,3562002-09-132003-02-10Network systemExpired - Fee RelatedUS7219134B2 (en)

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
JP2002267551AJP4309629B2 (en)2002-09-132002-09-13 Network system
JP2002-2675512002-09-13

Publications (2)

Publication NumberPublication Date
US20040054779A1 US20040054779A1 (en)2004-03-18
US7219134B2true US7219134B2 (en)2007-05-15

Family

ID=31884802

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US10/360,356Expired - Fee RelatedUS7219134B2 (en)2002-09-132003-02-10Network system

Country Status (5)

CountryLink
US (1)US7219134B2 (en)
EP (1)EP1398710B1 (en)
JP (1)JP4309629B2 (en)
CN (1)CN1287305C (en)
DE (1)DE60309796T2 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040198496A1 (en)*2003-03-102004-10-07Jean-Marie GattoDynamic configuration of a gaming system
US20050131876A1 (en)*2003-12-102005-06-16Ahuja Ratinder Paul S.Graphical user interface for capture system
US20050132079A1 (en)*2003-12-102005-06-16Iglesia Erik D.L.Tag data structure for maintaining relational data over captured objects
US20050132046A1 (en)*2003-12-102005-06-16De La Iglesia ErikMethod and apparatus for data capture and analysis system
US20050127171A1 (en)*2003-12-102005-06-16Ahuja Ratinder Paul S.Document registration
US20050166066A1 (en)*2004-01-222005-07-28Ratinder Paul Singh AhujaCryptographic policy enforcement
US20050177725A1 (en)*2003-12-102005-08-11Rick LoweVerifying captured objects before presentation
US20050267928A1 (en)*2004-05-112005-12-01Anderson Todd JSystems, apparatus and methods for managing networking devices
US20050289181A1 (en)*2004-06-232005-12-29William DeningerObject classification in a capture system
US20060047675A1 (en)*2004-08-242006-03-02Rick LoweFile system for a capture system
US20060167889A1 (en)*2005-01-252006-07-27International Business Machines CorporationCreating content associations through visual techniques in a content framework system
US20060291700A1 (en)*2005-06-082006-12-28Ogram Mark EInternet signature verification system
US20070036156A1 (en)*2005-08-122007-02-15Weimin LiuHigh speed packet capture
US20070050334A1 (en)*2005-08-312007-03-01William DeningerWord indexing in a capture system
US20070056021A1 (en)*2003-09-232007-03-08Etienne AnnicNetwork access system which is adapted for the use of a simplified signature method, and server used to implement same
US20070271371A1 (en)*2006-05-222007-11-22Reconnex CorporationAttributes of captured objects in a capture system
US20070271254A1 (en)*2006-05-222007-11-22Reconnex CorporationQuery generation for a capture system
US20070271372A1 (en)*2006-05-222007-11-22Reconnex CorporationLocational tagging in a capture system
US20080168086A1 (en)*2005-01-252008-07-10Miller Grant DContent framework system
US7424608B1 (en)2004-09-162008-09-09Sprint Communications Company L.P.Mechanism for layered authentication
US20080301439A1 (en)*2007-06-042008-12-04Yoko HashimotoValidation Server, Program and Verification Method
US20090006581A1 (en)*2005-12-272009-01-01Koninklijke Kpn N.V.Method and System For Downloading Streaming Content
US20090141872A1 (en)*2007-11-302009-06-04Wei LiMethod and apparatus for resuming the sessions between client device and ivr system
US20090232391A1 (en)*2005-11-212009-09-17Mcafee, Inc., A Delaware CorporationIdentifying Image Type in a Capture System
US7644270B1 (en)*2004-05-102010-01-05Sprint Communications Company L.P.Web services security architecture
US20100011410A1 (en)*2008-07-102010-01-14Weimin LiuSystem and method for data mining and security policy management
US7702900B1 (en)2005-09-202010-04-20Sprint Communications Company L.P.Web services security test framework and method
US7730011B1 (en)2005-10-192010-06-01Mcafee, Inc.Attributes of captured objects in a capture system
US7938726B2 (en)*2003-03-102011-05-10Mudalla Technology, Inc.Universal game download system for legacy gaming machines
US20130124870A1 (en)*2011-11-162013-05-16Certicom Corp.Cryptographic document processing in a network
US8447722B1 (en)2009-03-252013-05-21Mcafee, Inc.System and method for data mining and security policy management
US8473442B1 (en)2009-02-252013-06-25Mcafee, Inc.System and method for intelligent state management
US8504537B2 (en)2006-03-242013-08-06Mcafee, Inc.Signature distribution in a document registration system
US8560534B2 (en)2004-08-232013-10-15Mcafee, Inc.Database for a capture system
US8656039B2 (en)2003-12-102014-02-18Mcafee, Inc.Rule parser
US8667121B2 (en)2009-03-252014-03-04Mcafee, Inc.System and method for managing data and policies
US8700561B2 (en)2011-12-272014-04-15Mcafee, Inc.System and method for providing data protection workflows in a network environment
US8706709B2 (en)2009-01-152014-04-22Mcafee, Inc.System and method for intelligent term grouping
US8806615B2 (en)2010-11-042014-08-12Mcafee, Inc.System and method for protecting specified data combinations
US8850591B2 (en)2009-01-132014-09-30Mcafee, Inc.System and method for concept building
US20150193514A1 (en)*2008-09-302015-07-09Peter BradshawOn Demand Access to Client Cached Files
US9131024B2 (en)2005-12-302015-09-08Google Inc.Conflict management during data object synchronization between client and server
US9253154B2 (en)2008-08-122016-02-02Mcafee, Inc.Configuration management for a capture/registration system
US9270467B1 (en)*2013-05-162016-02-23Symantec CorporationSystems and methods for trust propagation of signed files across devices
US9374225B2 (en)2003-12-102016-06-21Mcafee, Inc.Document de-registration
US10289692B2 (en)2008-09-302019-05-14Google LlcPreserving file metadata during atomic save operations
US10484497B2 (en)2010-12-302019-11-19Zephyrtel, Inc.Methods and systems for caching data communications over computer networks

Families Citing this family (141)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10181953B1 (en)*2013-09-162019-01-15Amazon Technologies, Inc.Trusted data verification
US7565399B1 (en)*2002-08-262009-07-21Netapp, Inc.Caching web objects transformed by a pipeline of adaptation services
US8301884B2 (en)2002-09-162012-10-30Samsung Electronics Co., Ltd.Method of managing metadata
JP4397373B2 (en)*2002-10-152010-01-13サムスン エレクトロニクス カンパニー リミテッド How to manage metadata
EP1453271B1 (en)*2003-02-282018-05-30Telefonaktiebolaget LM Ericsson (publ)Device-type authentication in communication systems
JP2004341732A (en)*2003-05-142004-12-02Canon Inc Processing device, data processing method, program and storage medium
JP4454251B2 (en)*2003-05-192010-04-21日本放送協会 Content distribution system
JP4635009B2 (en)*2003-05-212011-02-16ヒューレット−パッカード デベロップメント カンパニー エル.ピー. Use of proven secret values in communications
US9678967B2 (en)2003-05-222017-06-13Callahan Cellular L.L.C.Information source agent systems and methods for distributed data storage and management using content signatures
US20040243852A1 (en)*2003-05-282004-12-02Rosenstein Adam H.Method, system and software for state signing of internet resources
FR2858896A1 (en)*2003-08-122005-02-18France Telecom METHOD OF MASKING APPLICATION TREATMENTS OF SERVER ACCESS REQUEST AND CORRESPONDING MASKING SYSTEM
FR2859587A1 (en)*2003-09-042005-03-11Orange France METHOD AND SYSTEM FOR CONTROLLING THE IDENTITY OF A SERVICE
US7539729B1 (en)*2003-09-152009-05-26Cloudmark, Inc.Method and apparatus to enable mass message publications to reach a client equipped with a filter
US7502334B2 (en)2003-11-192009-03-10Honeywell International Inc.Directional integrity enforcement in a bi-directional braided ring network
US7372859B2 (en)2003-11-192008-05-13Honeywell International Inc.Self-checking pair on a braided ring network
WO2005053270A2 (en)2003-11-192005-06-09Honeywell International Inc.Mobius time-triggered communication
JP2006033624A (en)*2004-07-202006-02-02Japan Telecom Co LtdCommunication control system
FR2873882A1 (en)*2004-07-292006-02-03France Telecom METHOD AND DEVICE FOR DISTINTING USER HTTP REQUESTS
US8667590B1 (en)*2004-08-202014-03-04Trend Micro IncorporatedMethod and apparatus for protecting high availability devices from computer viruses and other malicious content
US7509120B2 (en)2004-09-072009-03-24Research In Motion LimitedSystem and method for updating message trust status
EP2157759B1 (en)*2004-09-072013-01-09Research In Motion LimitedSystem and method for updating message trust status
US8776206B1 (en)*2004-10-182014-07-08Gtb Technologies, Inc.Method, a system, and an apparatus for content security in computer networks
US7574500B2 (en)*2005-02-142009-08-11Reactivity, Inc.Establishing a cache expiration time to be associated with newly generated output by determining module- specific cache expiration times for a plurality of processing modules
US7716243B2 (en)*2005-02-252010-05-11Microsoft CorporationProvisions for validating content using a content registration authority
US8538888B2 (en)*2005-03-312013-09-17Sony Pictures Entertainment Inc.Method for generating a secure copy of media data
US7758422B2 (en)*2005-04-132010-07-20Microsoft CorporationHard drive authentication
JP4723909B2 (en)*2005-05-272011-07-13株式会社日立製作所 Data exchange method, data exchange management device, and data exchange management program
US7636780B2 (en)*2005-07-282009-12-22Advanced Micro Devices, Inc.Verified computing environment for personal internet communicator
JP4843428B2 (en)*2005-09-162011-12-21株式会社リコー Information processing apparatus, information processing method, and information processing system
CN100587701C (en)*2005-10-182010-02-03松下电器产业株式会社 Information processing device and method thereof
FR2895817B1 (en)*2005-12-292009-09-11Trusted Logic Sa METHOD AND SYSTEM FOR PAGE ANALYSIS
KR100888593B1 (en)*2006-03-142009-03-12삼성전자주식회사 Content management method and device
US7668084B2 (en)2006-09-292010-02-23Honeywell International Inc.Systems and methods for fault-tolerant high integrity data propagation using a half-duplex braided ring network
JP5292297B2 (en)*2006-09-292013-09-18ノマディックス インコーポレイテッド System and method for inserting content
US7827138B2 (en)2006-10-022010-11-02Salesforce.Com, Inc.Method and system for synchronizing a server and an on-demand database service
KR100772534B1 (en)*2006-10-242007-11-01한국전자통신연구원 Public key based device authentication system and method
US7889683B2 (en)2006-11-032011-02-15Honeywell International Inc.Non-destructive media access resolution for asynchronous traffic in a half-duplex braided-ring
US8037182B2 (en)*2006-11-302011-10-11Microsoft CorporationCapture of content from dynamic resource services
US7656881B2 (en)2006-12-132010-02-02Honeywell International Inc.Methods for expedited start-up and clique aggregation using self-checking node pairs on a ring network
US7912094B2 (en)2006-12-132011-03-22Honeywell International Inc.Self-checking pair-based master/follower clock synchronization
JP5332117B2 (en)*2007-03-062013-11-06日本電気株式会社 WWW content acquisition system and WWW content acquisition method
US9130974B2 (en)*2007-04-182015-09-08Mcafee, Inc.System and method for limiting spyware activity
WO2008146639A1 (en)*2007-05-232008-12-04Nec CorporationInformation sharing system, computer, project management server and information sharing method used for them
EP2186332A4 (en)2007-09-112012-02-08Lg Electronics IncSecure signing method, secure authentication method and iptv system
US7778159B2 (en)2007-09-272010-08-17Honeywell International Inc.High-integrity self-test in a network having a braided-ring topology
US8817597B2 (en)2007-11-052014-08-26Honeywell International Inc.Efficient triple modular redundancy on a braided ring
CN101170520B (en)*2007-11-272010-06-02宁波大学 A signal processing method of network system based on UDDI
CN101582876A (en)*2008-05-122009-11-18华为技术有限公司Method, device and system for registering user generated content (UGC)
US8275830B2 (en)2009-01-282012-09-25Headwater Partners I LlcDevice assisted CDR creation, aggregation, mediation and billing
US8589541B2 (en)2009-01-282013-11-19Headwater Partners I LlcDevice-assisted services for protecting network capacity
US8832777B2 (en)2009-03-022014-09-09Headwater Partners I LlcAdapting network policies based on device service processor configuration
US8391834B2 (en)2009-01-282013-03-05Headwater Partners I LlcSecurity techniques for device assisted services
US8548428B2 (en)2009-01-282013-10-01Headwater Partners I LlcDevice group partitions and settlement platform
US8626115B2 (en)2009-01-282014-01-07Headwater Partners I LlcWireless network service interfaces
US8406748B2 (en)2009-01-282013-03-26Headwater Partners I LlcAdaptive ambient services
US8402111B2 (en)2009-01-282013-03-19Headwater Partners I, LlcDevice assisted services install
US8340634B2 (en)2009-01-282012-12-25Headwater Partners I, LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US8250207B2 (en)2009-01-282012-08-21Headwater Partners I, LlcNetwork based ambient services
US8635335B2 (en)2009-01-282014-01-21Headwater Partners I LlcSystem and method for wireless network offloading
US8346225B2 (en)2009-01-282013-01-01Headwater Partners I, LlcQuality of service for device assisted services
US10007668B2 (en)*2008-08-012018-06-26Vantrix CorporationMethod and system for triggering ingestion of remote content by a streaming server using uniform resource locator folder mapping
WO2010021143A1 (en)*2008-08-222010-02-25パナソニック株式会社Record-playback device
JP5251446B2 (en)*2008-11-172013-07-31富士通株式会社 Data sharing program, data sharing method, and data sharing apparatus
JP5287199B2 (en)*2008-12-102013-09-11富士通株式会社 Communication rule application method and apparatus for communication apparatus, and communication apparatus
US9609510B2 (en)2009-01-282017-03-28Headwater Research LlcAutomated credential porting for mobile devices
US10057775B2 (en)2009-01-282018-08-21Headwater Research LlcVirtualized policy and charging system
US9578182B2 (en)2009-01-282017-02-21Headwater Partners I LlcMobile device and service management
US10200541B2 (en)2009-01-282019-02-05Headwater Research LlcWireless end-user device with divided user space/kernel space traffic policy system
US9647918B2 (en)2009-01-282017-05-09Headwater Research LlcMobile device and method attributing media services network usage to requesting application
US9557889B2 (en)2009-01-282017-01-31Headwater Partners I LlcService plan design, user interfaces, application programming interfaces, and device management
US10326800B2 (en)2009-01-282019-06-18Headwater Research LlcWireless network service interfaces
US10264138B2 (en)2009-01-282019-04-16Headwater Research LlcMobile device and service management
US10783581B2 (en)2009-01-282020-09-22Headwater Research LlcWireless end-user device providing ambient or sponsored services
US9706061B2 (en)2009-01-282017-07-11Headwater Partners I LlcService design center for device assisted services
US10064055B2 (en)2009-01-282018-08-28Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US11218854B2 (en)2009-01-282022-01-04Headwater Research LlcService plan design, user interfaces, application programming interfaces, and device management
US9572019B2 (en)2009-01-282017-02-14Headwater Partners LLCService selection set published to device agent with on-device service selection
US10492102B2 (en)2009-01-282019-11-26Headwater Research LlcIntermediate networking devices
US12166596B2 (en)2009-01-282024-12-10Disney Enterprises, Inc.Device-assisted services for protecting network capacity
US10798252B2 (en)2009-01-282020-10-06Headwater Research LlcSystem and method for providing user notifications
US10248996B2 (en)2009-01-282019-04-02Headwater Research LlcMethod for operating a wireless end-user device mobile payment agent
US12432130B2 (en)2009-01-282025-09-30Headwater Research LlcFlow tagging for service policy implementation
US9980146B2 (en)2009-01-282018-05-22Headwater Research LlcCommunications device with secure data path processing agents
US10841839B2 (en)2009-01-282020-11-17Headwater Research LlcSecurity, fraud detection, and fraud mitigation in device-assisted services systems
US10484858B2 (en)2009-01-282019-11-19Headwater Research LlcEnhanced roaming services and converged carrier networks with device assisted services and a proxy
US9565707B2 (en)2009-01-282017-02-07Headwater Partners I LlcWireless end-user device with wireless data attribution to multiple personas
US9955332B2 (en)2009-01-282018-04-24Headwater Research LlcMethod for child wireless device activation to subscriber account of a master wireless device
US10779177B2 (en)2009-01-282020-09-15Headwater Research LlcDevice group partitions and settlement platform
US9392462B2 (en)2009-01-282016-07-12Headwater Partners I LlcMobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9270559B2 (en)2009-01-282016-02-23Headwater Partners I LlcService policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US10237757B2 (en)2009-01-282019-03-19Headwater Research LlcSystem and method for wireless network offloading
US9954975B2 (en)2009-01-282018-04-24Headwater Research LlcEnhanced curfew and protection associated with a device group
US12388810B2 (en)2009-01-282025-08-12Headwater Research LlcEnd user device that secures an association of application to service policy with an application certificate check
US12389218B2 (en)2009-01-282025-08-12Headwater Research LlcService selection set publishing to device agent with on-device service selection
US11985155B2 (en)2009-01-282024-05-14Headwater Research LlcCommunications device with secure data path processing agents
US11973804B2 (en)2009-01-282024-04-30Headwater Research LlcNetwork service plan design
US9571559B2 (en)2009-01-282017-02-14Headwater Partners I LlcEnhanced curfew and protection associated with a device group
US10715342B2 (en)2009-01-282020-07-14Headwater Research LlcManaging service user discovery and service launch object placement on a device
US9858559B2 (en)2009-01-282018-01-02Headwater Research LlcNetwork service plan design
US20110126018A1 (en)*2009-11-232011-05-26Anees NarsinhMethods and systems for transaction digital watermarking in content delivery network
US20120059712A1 (en)*2009-12-112012-03-08Stalker James RWeb enhancing systems and methods
JP5567906B2 (en)2010-06-042014-08-06インターナショナル・ビジネス・マシーンズ・コーポレーション Apparatus and method for supporting screen reproduction
EP3518504B1 (en)2010-12-302020-09-16Peerapp, Ltd.Methods and systems for transmission of data over computer networks
US8544090B1 (en)*2011-01-212013-09-24Symantec CorporationSystems and methods for detecting a potentially malicious uniform resource locator
JP2013077188A (en)*2011-09-302013-04-25Brother Ind LtdInformation processing program, information processing device and information processing method
JP5593452B2 (en)2011-10-122014-09-24インターナショナル・ビジネス・マシーンズ・コーポレーション Method, system, mediation server, client, and computer program for deleting information to maintain security level
US8683207B2 (en)*2011-12-192014-03-25Microsoft CorporationUpdating signature algorithms for strong name binding
US8955103B2 (en)*2012-01-052015-02-10Hightail, Inc.System and method for decentralized online data transfer and synchronization
US9526091B2 (en)2012-03-162016-12-20Intel CorporationMethod and apparatus for coordination of self-optimization functions in a wireless network
US8966248B2 (en)*2012-04-062015-02-24GM Global Technology Operations LLCSecure software file transfer systems and methods for vehicle control modules
DE102013205851B4 (en)2012-04-062025-05-15GM Global Technology Operations, LLC (n.d. Ges. d. Staates Delaware) Systems and methods for secure transfer of software files for vehicle control modules
US8838715B2 (en)*2012-05-252014-09-16Sap AgProviding client system support
US20140373167A1 (en)*2012-08-092014-12-18Nippon Telegraph And Telephone CorporationTrace center apparatus and method for enabling contents to be traced
PL2704391T3 (en)*2012-08-272019-10-31BroadpeakSystem and method for delivering an audio-visual content to a client device
CN102929958A (en)*2012-10-102013-02-13无锡江南计算技术研究所Metadata processing method, agenting and forwarding equipment, server and computing system
JP6056384B2 (en)*2012-10-312017-01-11株式会社リコー System and service providing apparatus
US8826432B2 (en)2012-12-062014-09-02Airwatch, LlcSystems and methods for controlling email access
CN103856468B (en)*2012-12-062017-05-31鸿富锦精密工业(深圳)有限公司Authentication system and method
US9021037B2 (en)2012-12-062015-04-28Airwatch LlcSystems and methods for controlling email access
US8862868B2 (en)*2012-12-062014-10-14Airwatch, LlcSystems and methods for controlling email access
US8978110B2 (en)2012-12-062015-03-10Airwatch LlcSystems and methods for controlling email access
CN103873430A (en)*2012-12-102014-06-18腾讯科技(深圳)有限公司Method, client and system for page information verification
CN103036883B (en)*2012-12-142015-11-04公安部第一研究所 A secure communication method and system for a secure server
KR102063681B1 (en)*2013-03-112020-01-08삼성전자주식회사Communicaton method of administration node, requesting node and normal node deleting unvalid contents using contents revocation list in a contents centric network
JP6367523B2 (en)*2013-03-182018-08-01晴明 山崎 Data transmission / reception method and data transmission / reception system using wide area communication network
CN104065688B (en)*2013-03-222018-09-11深圳市腾讯计算机系统有限公司A kind of method and device for calling underlying services
US9787686B2 (en)2013-04-122017-10-10Airwatch LlcOn-demand security policy activation
JP6171597B2 (en)*2013-06-102017-08-02富士通株式会社 Verification system, verification method, verification program
KR102134429B1 (en)*2013-10-042020-07-15삼성전자주식회사Method and apparatus for content verification
US9240994B2 (en)*2013-10-282016-01-19At&T Intellectual Property I, LpApparatus and method for securely managing the accessibility to content and applications
EP2942925B1 (en)*2014-05-052016-08-24Advanced Digital Broadcast S.A.A method and system for providing a private network
CN105991565B (en)2015-02-052019-01-25阿里巴巴集团控股有限公司Method, system and the database proxy server of read and write abruption
CN104967604B (en)*2015-04-212018-07-20深圳市腾讯计算机系统有限公司Login method and system
US9197673B1 (en)*2015-05-182015-11-24A2Zlogix, Inc.System and method for reception and transmission optimization of secured video, image, audio, and other media traffic via proxy
JP2017182665A (en)*2016-03-312017-10-05富士通株式会社 Information processing apparatus, data providing system, data providing method, and data providing program
US20190327310A1 (en)*2016-12-092019-10-24Nutanix, Inc.Efficient approach for achieving session failover for http traffic in a scale out web tier using a shared salt
CN108243143B (en)*2016-12-232020-05-19北京明朝万达科技股份有限公司Web agent-based gatekeeper penetration method and system
JP7343041B2 (en)*2020-03-272023-09-12日本電気株式会社 Verification equipment, verification system, verification method and verification program
FR3110801A1 (en)*2020-05-252021-11-26Orange Method of delegating the delivery of content to a cache server
CN111880824A (en)*2020-07-242020-11-03欧姆龙(上海)有限公司 Device and method for verifying firmware data, device and method for updating firmware, and system
CN114584602B (en)*2022-03-012023-08-29百果园技术(新加坡)有限公司Session state management method, system, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2000285061A (en)1999-03-312000-10-13Nec CorpProxy access control system
WO2000064122A1 (en)1999-04-152000-10-26Gilian Technologies, Ltd.Monitoring integrity of transmitted data
EP1132799A2 (en)2000-01-062001-09-12International Business Machines CorporationMethod and system for generating and using a virus free file certificate
US20010051996A1 (en)*2000-02-182001-12-13Cooper Robin RossNetwork-based content distribution system
JP2002135239A (en)2000-10-202002-05-10Nec CorpEncryption data distribution service system
US20020120577A1 (en)*2001-02-272002-08-29Hans Mathieu C.Managing access to digital content
US20020128984A1 (en)*2001-02-262002-09-124Thpass Inc.Method and system for transmission-based billing of applications

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP3629516B2 (en)*2000-11-022005-03-16インターナショナル・ビジネス・マシーンズ・コーポレーション Proxy server, electronic signature system, electronic signature verification system, network system, electronic signature method, electronic signature verification method, and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP2000285061A (en)1999-03-312000-10-13Nec CorpProxy access control system
WO2000064122A1 (en)1999-04-152000-10-26Gilian Technologies, Ltd.Monitoring integrity of transmitted data
EP1132799A2 (en)2000-01-062001-09-12International Business Machines CorporationMethod and system for generating and using a virus free file certificate
US20010051996A1 (en)*2000-02-182001-12-13Cooper Robin RossNetwork-based content distribution system
JP2002135239A (en)2000-10-202002-05-10Nec CorpEncryption data distribution service system
US20020128984A1 (en)*2001-02-262002-09-124Thpass Inc.Method and system for transmission-based billing of applications
US20020120577A1 (en)*2001-02-272002-08-29Hans Mathieu C.Managing access to digital content

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"Signature Server, The Beginning of a New Era", NEWSONINK, www.cryptomatic.com, Jan. 2001, pp. 1-4.
"The Beginning of a New Era", Newsonink, XP-002215192, pp. 1-4.
C. Fielding "Hypertext Transfer Protocol", Network Working Group, 1999, pp. 1-176.
G. Tomlinson, et al "Extensible Proxy Services Framework", Network Working Group, Internet-Draft, Jan. 11, 2001, pp. 1-44.
Internet Content Adaptation Protocol (ICAP), Network Appliance, Version 1.01, Jul. 30, 2001, pp. 1-13.

Cited By (102)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8122512B2 (en)2003-03-102012-02-21IgtDynamic configuration of a gaming system
US7908486B2 (en)*2003-03-102011-03-15IgtDynamic configuration of a gaming system
US7938726B2 (en)*2003-03-102011-05-10Mudalla Technology, Inc.Universal game download system for legacy gaming machines
US20080214309A1 (en)*2003-03-102008-09-04Cyberview Technology, Inc.Dynamic configuration of a gaming system
US20080167132A1 (en)*2003-03-102008-07-10Cyberview Technology, Inc.Dynamic configuration of a gaming system
US20040198496A1 (en)*2003-03-102004-10-07Jean-Marie GattoDynamic configuration of a gaming system
US7823188B2 (en)*2003-09-232010-10-26OrangefranceNetwork access system which is adapted for the use of a simplified signature method, and server used to implement same
US20070056021A1 (en)*2003-09-232007-03-08Etienne AnnicNetwork access system which is adapted for the use of a simplified signature method, and server used to implement same
US7774604B2 (en)2003-12-102010-08-10Mcafee, Inc.Verifying captured objects before presentation
US7814327B2 (en)2003-12-102010-10-12Mcafee, Inc.Document registration
US8271794B2 (en)2003-12-102012-09-18Mcafee, Inc.Verifying captured objects before presentation
US8166307B2 (en)2003-12-102012-04-24McAffee, Inc.Document registration
US9092471B2 (en)2003-12-102015-07-28Mcafee, Inc.Rule parser
US20110219237A1 (en)*2003-12-102011-09-08Mcafee, Inc., A Delaware CorporationDocument registration
US7899828B2 (en)2003-12-102011-03-01Mcafee, Inc.Tag data structure for maintaining relational data over captured objects
US20050177725A1 (en)*2003-12-102005-08-11Rick LoweVerifying captured objects before presentation
US8656039B2 (en)2003-12-102014-02-18Mcafee, Inc.Rule parser
US9374225B2 (en)2003-12-102016-06-21Mcafee, Inc.Document de-registration
US20050127171A1 (en)*2003-12-102005-06-16Ahuja Ratinder Paul S.Document registration
US20110196911A1 (en)*2003-12-102011-08-11McAfee, Inc. a Delaware CorporationTag data structure for maintaining relational data over captured objects
US20050132046A1 (en)*2003-12-102005-06-16De La Iglesia ErikMethod and apparatus for data capture and analysis system
US7984175B2 (en)2003-12-102011-07-19Mcafee, Inc.Method and apparatus for data capture and analysis system
US8762386B2 (en)2003-12-102014-06-24Mcafee, Inc.Method and apparatus for data capture and analysis system
US20050131876A1 (en)*2003-12-102005-06-16Ahuja Ratinder Paul S.Graphical user interface for capture system
US8301635B2 (en)2003-12-102012-10-30Mcafee, Inc.Tag data structure for maintaining relational data over captured objects
US20050132079A1 (en)*2003-12-102005-06-16Iglesia Erik D.L.Tag data structure for maintaining relational data over captured objects
US7930540B2 (en)2004-01-222011-04-19Mcafee, Inc.Cryptographic policy enforcement
US20050166066A1 (en)*2004-01-222005-07-28Ratinder Paul Singh AhujaCryptographic policy enforcement
US8307206B2 (en)2004-01-222012-11-06Mcafee, Inc.Cryptographic policy enforcement
US7644270B1 (en)*2004-05-102010-01-05Sprint Communications Company L.P.Web services security architecture
US7966391B2 (en)*2004-05-112011-06-21Todd J. AndersonSystems, apparatus and methods for managing networking devices
US20050267928A1 (en)*2004-05-112005-12-01Anderson Todd JSystems, apparatus and methods for managing networking devices
US20050289181A1 (en)*2004-06-232005-12-29William DeningerObject classification in a capture system
US7962591B2 (en)2004-06-232011-06-14Mcafee, Inc.Object classification in a capture system
US8560534B2 (en)2004-08-232013-10-15Mcafee, Inc.Database for a capture system
US7949849B2 (en)2004-08-242011-05-24Mcafee, Inc.File system for a capture system
US20060047675A1 (en)*2004-08-242006-03-02Rick LoweFile system for a capture system
US8707008B2 (en)2004-08-242014-04-22Mcafee, Inc.File system for a capture system
US7424608B1 (en)2004-09-162008-09-09Sprint Communications Company L.P.Mechanism for layered authentication
US20060167889A1 (en)*2005-01-252006-07-27International Business Machines CorporationCreating content associations through visual techniques in a content framework system
US7831631B2 (en)2005-01-252010-11-09International Business Machines CorporationContent framework system
US7685159B2 (en)2005-01-252010-03-23International Business Machines CorporationCreating content associations through visual techniques in a content framework system
US20080168086A1 (en)*2005-01-252008-07-10Miller Grant DContent framework system
US20060291700A1 (en)*2005-06-082006-12-28Ogram Mark EInternet signature verification system
US20070036156A1 (en)*2005-08-122007-02-15Weimin LiuHigh speed packet capture
US8730955B2 (en)2005-08-122014-05-20Mcafee, Inc.High speed packet capture
US7907608B2 (en)2005-08-122011-03-15Mcafee, Inc.High speed packet capture
US7818326B2 (en)2005-08-312010-10-19Mcafee, Inc.System and method for word indexing in a capture system and querying thereof
US8554774B2 (en)2005-08-312013-10-08Mcafee, Inc.System and method for word indexing in a capture system and querying thereof
US20070050334A1 (en)*2005-08-312007-03-01William DeningerWord indexing in a capture system
US7702900B1 (en)2005-09-202010-04-20Sprint Communications Company L.P.Web services security test framework and method
US8176049B2 (en)2005-10-192012-05-08Mcafee Inc.Attributes of captured objects in a capture system
US7730011B1 (en)2005-10-192010-06-01Mcafee, Inc.Attributes of captured objects in a capture system
US8463800B2 (en)2005-10-192013-06-11Mcafee, Inc.Attributes of captured objects in a capture system
US20100185622A1 (en)*2005-10-192010-07-22Mcafee, Inc.Attributes of Captured Objects in a Capture System
US20090232391A1 (en)*2005-11-212009-09-17Mcafee, Inc., A Delaware CorporationIdentifying Image Type in a Capture System
US8200026B2 (en)2005-11-212012-06-12Mcafee, Inc.Identifying image type in a capture system
US20090006581A1 (en)*2005-12-272009-01-01Koninklijke Kpn N.V.Method and System For Downloading Streaming Content
US9131024B2 (en)2005-12-302015-09-08Google Inc.Conflict management during data object synchronization between client and server
US8504537B2 (en)2006-03-242013-08-06Mcafee, Inc.Signature distribution in a document registration system
US8005863B2 (en)2006-05-222011-08-23Mcafee, Inc.Query generation for a capture system
US8010689B2 (en)2006-05-222011-08-30Mcafee, Inc.Locational tagging in a capture system
US7689614B2 (en)2006-05-222010-03-30Mcafee, Inc.Query generation for a capture system
US20070271371A1 (en)*2006-05-222007-11-22Reconnex CorporationAttributes of captured objects in a capture system
US20070271254A1 (en)*2006-05-222007-11-22Reconnex CorporationQuery generation for a capture system
US9094338B2 (en)2006-05-222015-07-28Mcafee, Inc.Attributes of captured objects in a capture system
US20070271372A1 (en)*2006-05-222007-11-22Reconnex CorporationLocational tagging in a capture system
US8683035B2 (en)2006-05-222014-03-25Mcafee, Inc.Attributes of captured objects in a capture system
US7958227B2 (en)2006-05-222011-06-07Mcafee, Inc.Attributes of captured objects in a capture system
US20100121853A1 (en)*2006-05-222010-05-13Mcafee, Inc., A Delaware CorporationQuery generation for a capture system
US8307007B2 (en)2006-05-222012-11-06Mcafee, Inc.Query generation for a capture system
US20080301439A1 (en)*2007-06-042008-12-04Yoko HashimotoValidation Server, Program and Verification Method
US8437466B2 (en)*2007-11-302013-05-07International Business Machines CorporationMethod and apparatus for resuming the sessions between client device and IVR system
US20090141872A1 (en)*2007-11-302009-06-04Wei LiMethod and apparatus for resuming the sessions between client device and ivr system
US8635706B2 (en)2008-07-102014-01-21Mcafee, Inc.System and method for data mining and security policy management
US8205242B2 (en)2008-07-102012-06-19Mcafee, Inc.System and method for data mining and security policy management
US20100011410A1 (en)*2008-07-102010-01-14Weimin LiuSystem and method for data mining and security policy management
US8601537B2 (en)2008-07-102013-12-03Mcafee, Inc.System and method for data mining and security policy management
US10367786B2 (en)2008-08-122019-07-30Mcafee, LlcConfiguration management for a capture/registration system
US9253154B2 (en)2008-08-122016-02-02Mcafee, Inc.Configuration management for a capture/registration system
US10289692B2 (en)2008-09-302019-05-14Google LlcPreserving file metadata during atomic save operations
US9934240B2 (en)*2008-09-302018-04-03Google LlcOn demand access to client cached files
US20150193514A1 (en)*2008-09-302015-07-09Peter BradshawOn Demand Access to Client Cached Files
US8850591B2 (en)2009-01-132014-09-30Mcafee, Inc.System and method for concept building
US8706709B2 (en)2009-01-152014-04-22Mcafee, Inc.System and method for intelligent term grouping
US9195937B2 (en)2009-02-252015-11-24Mcafee, Inc.System and method for intelligent state management
US8473442B1 (en)2009-02-252013-06-25Mcafee, Inc.System and method for intelligent state management
US9602548B2 (en)2009-02-252017-03-21Mcafee, Inc.System and method for intelligent state management
US8667121B2 (en)2009-03-252014-03-04Mcafee, Inc.System and method for managing data and policies
US8447722B1 (en)2009-03-252013-05-21Mcafee, Inc.System and method for data mining and security policy management
US9313232B2 (en)2009-03-252016-04-12Mcafee, Inc.System and method for data mining and security policy management
US8918359B2 (en)2009-03-252014-12-23Mcafee, Inc.System and method for data mining and security policy management
US9794254B2 (en)2010-11-042017-10-17Mcafee, Inc.System and method for protecting specified data combinations
US8806615B2 (en)2010-11-042014-08-12Mcafee, Inc.System and method for protecting specified data combinations
US10313337B2 (en)2010-11-042019-06-04Mcafee, LlcSystem and method for protecting specified data combinations
US10666646B2 (en)2010-11-042020-05-26Mcafee, LlcSystem and method for protecting specified data combinations
US11316848B2 (en)2010-11-042022-04-26Mcafee, LlcSystem and method for protecting specified data combinations
US10484497B2 (en)2010-12-302019-11-19Zephyrtel, Inc.Methods and systems for caching data communications over computer networks
US20130124870A1 (en)*2011-11-162013-05-16Certicom Corp.Cryptographic document processing in a network
US9430564B2 (en)2011-12-272016-08-30Mcafee, Inc.System and method for providing data protection workflows in a network environment
US8700561B2 (en)2011-12-272014-04-15Mcafee, Inc.System and method for providing data protection workflows in a network environment
US9270467B1 (en)*2013-05-162016-02-23Symantec CorporationSystems and methods for trust propagation of signed files across devices

Also Published As

Publication numberPublication date
CN1494010A (en)2004-05-05
CN1287305C (en)2006-11-29
EP1398710A2 (en)2004-03-17
DE60309796T2 (en)2007-10-11
DE60309796D1 (en)2007-01-04
JP4309629B2 (en)2009-08-05
EP1398710B1 (en)2006-11-22
EP1398710A3 (en)2004-11-17
JP2004102951A (en)2004-04-02
US20040054779A1 (en)2004-03-18

Similar Documents

PublicationPublication DateTitle
US7219134B2 (en)Network system
US7676828B1 (en)Method and system for authenticating and authorizing requestors interacting with content servers
US7730089B2 (en)Method and system for providing remote access to the facilities of a server computer
US9380028B2 (en)Proxy server operation
US7542999B2 (en)Extended file system
US7783767B2 (en)System and method for distributed media streaming and sharing
CN114650144B (en)File sharing method and system based on blockchain, electronic equipment and storage medium
US20040039925A1 (en)Key management
US20030014629A1 (en)Root certificate management system and method
KR20040096500A (en)Method and system for upgrading and rolling back versions
JP2002540540A (en) Server computer that guarantees file integrity
Mosko et al.Content-centric networking (CCNx) semantics
CN107948235B (en) JAR-based cloud data security management and auditing device
CN113300848A (en)Method and device for determining certificate state
Bruijnzeels et al.The RPKI repository delta protocol (RRDP)
US8171467B1 (en)Updating of malicious code patterns using public DNS servers
US20020066044A1 (en)Information distributing system and method thereof
HK1062939A (en)Network system
JP2003091420A (en)Program for update, device program and program update supporting method
EP2605477A1 (en)Proxy server operation
US20250227097A1 (en)Efficient and secure delivery of repetitive material over a network
JP4403124B2 (en) System, apparatus, method and program for content sharing
EP2792119B1 (en)Proxy server operation
CN118174942A (en) Data transmission method, device and readable storage medium
Bruijnzeels et al.RFC 8182: The RPKI Repository Delta Protocol (RRDP)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:HITACHI, LTD., JAPAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TAKESHIMA, YOSHITERU;NAKAHARA, MASAHIKO;REEL/FRAME:014070/0501;SIGNING DATES FROM 20030424 TO 20030428

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPPFee payment procedure

Free format text:PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FPAYFee payment

Year of fee payment:4

REMIMaintenance fee reminder mailed
LAPSLapse for failure to pay maintenance fees
STCHInformation on status: patent discontinuation

Free format text:PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FPLapsed due to failure to pay maintenance fee

Effective date:20150515


[8]ページ先頭

©2009-2025 Movatter.jp